Robust Distributed Multiplication without Interaction
- 16 December 1999
- book chapter
- Published by Springer Nature
- p. 130-147
- https://doi.org/10.1007/3-540-48405-1_9
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Threshold cryptosystemsPublished by Springer Nature ,2001
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)Published by Springer Nature ,1999
- Efficient Multiparty Computations Secure Against an Adaptive AdversaryPublished by Springer Nature ,1999
- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attackPublished by Springer Nature ,1998
- A Secure and Optimally Efficient Multi-Authority Election SchemePublished by Springer Nature ,1997
- Efficient generation of shared RSA keysPublished by Springer Nature ,1997
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- Optimal algorithms for Byzantine agreementPublished by Association for Computing Machinery (ACM) ,1988
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988
- A practical scheme for non-interactive verifiable secret sharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987